DSpace Repository

Browsing CS Theses, 2000 by Title

Browsing CS Theses, 2000 by Title

Sort by: Order: Results:

  • Jirasak Submanee
    Electronic commerce, in a broad sense, is the use of computer networks to improve organizational performance. Increasing profitability, gaining market share, improving customer service and delivering products faster are ...
  • Thepparit Banditwattanawong
    It is percieved that only pure object-oriented techniques are inadequate to face challenges effectively in intelligent software development. To overcome this limitation, the agent concept has been used to extend traditional ...
  • Khin Ann Mon
    This study aims to understand the fundamental concepts of fuzzy concepts and access its usefulness in the studies of control systems along with the example of elevator group control system. The concept seems to be potentially ...
  • Piti Cherntanomwong
    Virtual Private Networks (VPN) are used by companies for connecting between their headquarters and remotes branches because the company can eliminate the leased line cost, which is extremely expensive. However, VPN is ...
  • Kyaw Hlaing Aye
    Bayesian belief networks have proven to be an effective technique for representing and reasoning with uncertain knowledge. A Bayesian network is a graphical representation of a probability distribution. Therefore statistical ...
  • Tserenbat, Baljinnyam
    Bayesian belief networks have proven to be an effective technique for representing and reasoning with uncertain knowledge. A Bayesian network is a graphical representation of a probability distribution. Therefore statistical ...
  • Tatpong Katanyukul
    Clustering is the important preliminary task for data mining. Its result is useful for data reduction and hypothesis extraction from data. The complication of data characteristics can degrade the clustering performance. ...
  • Krit Witwiyaruj
    Ordered Binary Decision Diagram (OBDD) is a directed acyclic graph, which has been used as an efficient tool to reduce the amount of space and computation required for verifying digital circuits by removing redundant copies ...
  • Rajpar, Masroor A.
    This study is about the analysis, designing and implementation requirements of electronic commerce application of doing the mission-critical business for organizations. This study propose how to design and implement ...
  • Pichai Lertprasitpun
    Since modern applications have applied Extensible Markup Language (XML) to encode their data and information, traditional databases including relational and object-oriented databases have been used to handle XML documents. ...
  • Chippimolchai, Pongtawat (AIT, 2000-08)
    Plug-and-Play Networking means that a component in the network has the ability to automatically configure itself according to its capabilities, its environment and changes in its environment. In the dynamic plug-and-play ...
  • J. Seng Ja
    The Gregory patch is a modification of the Bà à à à à à ©zier patch using Gregoryà à à à à ¢ s solution for the twist incompatibility in a Coons patch. The main feature of the Gregory patch is ...
  • Mongkol Ekpanyapong
    Recent development on a new paradigm involving image mapping by using Ordered Binary Decision Diagram (OBDD) has significantly shown the effectiveness in both the image compression and recognition. Nevertheless, there are ...
  • Natee Pantong
    Active Tracking Function (ATF) is one of calculation parts used in Air Defense Systems. It performs the important role in calculating the track prediction of aircraft. Active Tracking Function can be divided into three ...
  • Voraluk Phoomratsameewong
    December 2000
  • Phanom Slisatkorn
    Extensible Markup Language (XML) is a new Web specification especially designed for delivering structure content over the Web and currently plays an increasingly significant role in the Web application and the data interchange ...
  • Nguyen Kieu Oanh
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Prajogo, Agus Susanto
    The Internet not only provides data for users to browse, but also databases to query, and software agents to run. Due to the exponential increase of deployed agents on the Internet, automating the search and selection of ...
  • Piriya Utamachant
    Computer technology and expansion of global networks makes information available all over the world. While information technology has developed dramatically, new threats and attacks have also been introduced. The role of ...
  • Junpen Chunsatit
    To improve response time and reduce network congestion in the present WWW, centralized directory caching system has been introduced. One such centralized directory caching system is WebHint, which keeps track of proxy ...

Search DSpace


Advanced Search

Browse

My Account